Operation 2025 2026() 2025() 2024() 2023() 2022() OTHER()
|
DATE |
NAME |
INFO |
CATEGORY |
SUBCATE |
|
17.12.25 |
Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports |
|||
|
13.12.25 |
Table of Contents: Introduction: Targeted sectors: Initial Findings about Campaign: Analysis of Phishing Mail: Infection Chain: Technical Analysis: Stage-1: Analysis of Malicious ISO file. Stage-2: |
|||
|
13.12.25 |
Operation FrostBeacon: Multi-Cluster Cobalt Strike Campaign Targets Russia Contents Introduction Key Targets Geographical Focus Industries Affected LNK Cluster Initial Access: |
|||
|
6.12.25 |
Contents Introduction Key Targets. Industries Affected. Geographical Focus. Infection Chain. Initial Findings. Looking into the decoy-document Technical Analysis Stage 1 – Malicious LNK Script Stage 2 – |
|||
|
26.11.25 |
Russian RomCom Utilizing SocGholish to Deliver Mythic Agent to U.S. Companies Supporting Ukraine |
|||
|
19.11.25 |
Operation WrtHug, The Global Espionage Campaign Hiding in Your Home Router |
|||
|
8.11.25 |
Initial Findings. Technical Analysis. Campaign – I The LNK Way. Malicious SILENT LOADER Malicious LAPLAS Implant – TCP & TLS. Malicious .NET Implant – SilentSweeper Campaign –... |
|||
|
1.11.25 |
Authors: Sathwik Ram Prakki and Kartikkumar Jivani Contents Introduction Key Targets Industries Geographical Focus Infection and Decoys Technical Analysis PowerShell Stage Persistence C.. |
|||
|
1.11.25 |
From Scripts to Systems: A Comprehensive Look at Tangerine Turkey Operations |
|||
|
18.10.25 |
Malicious .NET Implant Hunting and Infrastructure. Conclusion Seqrite Protection. IOCs MITRE ATT&CK.... |
|||
|
18.10.25 |
Introduction: Seqrite Lab has been actively monitoring global cyber threat... |
|||
|
27.9.25 |
Operation Rewrite: Chinese-Speaking Threat Actors Deploy BadIIS in a Wide Scale SEO Poisoning Campaign |
|||
|
23.9.25 |
Operation Rewrite: Chinese-Speaking Threat Actors Deploy BadIIS in a Wide Scale SEO Poisoning Campaign |
|||
|
21.9.25 |
Cloudflare participates in global operation to disrupt RaccoonO365 |
|||
|
16.9.25 |
SlopAds |
Satori Threat Intelligence Alert: SlopAds Covers Fraud with Layers of Obfuscation |
||
|
7.9.25 |
NoisyBear targets entities linked to Kazakhstan’s Oil & Gas Sector. |
|||
|
4.9.25 |
Private Industry Takes Action Against Global Cyber Threats |
|||
|
30.8.25 |
Table of Contents: Introduction Threat Profile Infection Chain Campaign-1 Analysis of Decoy: Technical Analysis Fingerprint of ROKRAT’s Malware Campaign-2 |
|||
|
17.8.25 |
UNG0901 Targets Russian Aerospace & Defense Sector using EAGLET implant. |
|||
|
25.7.25 |
In June 2025, threat actors carried out a strategic web compromise by replacing the legitimate link, tibetfund.org/90thbirthday, on a compromised webpage with a malicious link. |
|||
|
25.7.25 |
In June 2025, a new subdomain, hhthedalailama90.niccenter[.]net was used by the threat actor to distribute a malicious application masquerading as a "special prayer check-in" software. |
|||
|
8.6.25 |
A malicious campaign discovered by Positive Technologies specialists is primarily targeting residents of Brazil. Attacks have been detected since the beginning of 2025. |
|||
|
23.5.25 |
Overview Seqrite Labs, India’s largest Malware Analysis lab, has identified multiple cyber events linked to Operation Sindoor, involving state- sponsored APT activity and coordinated hacktivist operations. |
|||
| 25.4.25 | ELUSIVE COMET | Mitigating ELUSIVE COMET Zoom remote control attacks | OPERATION | |
| 25.4.25 | Scallywag | Scallywag Extensions Monetize Piracy | OPERATION | |
| 24.4.25 | Operation SyncHole | Operation SyncHole: Lazarus APT goes back to the well | OPERATION | |
| 22.4.25 | SuperCard X | SuperCard X: exposing a Chinese-speaker MaaS for NFC Relay fraud operation | OPERATION | |
| 21.4.25 | Operation BlackEcho | Voice Phishing using Fake Financial and Vaccine Apps | OPERATION | |
|
25.3.25 |
Operational Relay Box (ORB) | An Introduction to Operational Relay Box (ORB) Networks - Unpatched, Forgotten, and Obscured | OPERATION | |
|
21.3.25 |
Operation FishMedley | ESET researchers detail a global espionage operation by FishMonger, the APT group run by I‑SOON | OPERATION | |
|
19.3.25 |
Operation AkaiRyū | Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor | OPERATION | |
| 22.2.25 | Harvest | Operation ‘Harvest’: A Deep Dive into a Long-term Campaign | OPERATION | |
| 15.2.25 | Operation Marstech Mayhen | Lazarus Group’s Open-Source Trap: North Korea’s New Malware Tactic Targeting Developers and Crypto Wallets | OPERATION | |
| 28.1.25 | Operation Phantom Circuit | North Korea’s Global Data Exfiltration Campaign | OPERATION | |
|
16.1.25 | Operation 99 | Operation 99: North Korea’s Cyber Assault on Software Developers | OPERATION |